Papers by aubrey labuschagne

Technology has become intertwined into society daily life which is not only limited to personal l... more Technology has become intertwined into society daily life which is not only limited to personal life but also extending into the business world. Availability, integrity and confidentiality are critical information security factors to consider when interacting with technology. Conversely many unsuspecting users have fallen prey to cyber criminals. The majority of threats encountered could have been prevented by the victims if they had sufficient knowledge to first identify and then mitigate the threat. The use of information A study regarding the effectiveness of game play as part of an information security awareness program for novices v Table of Contents Acknowledgements ii Abstract iv List of Figures viii List of Tables x List of Abbreviations xi Chapter 1: Introduction and Research Objectives A study regarding the effectiveness of game play as part of an information security awareness program for novices vi 3.5.

International Journal of Cyber Warfare and Terrorism, 2018
This article describes how social media has revolutionised the way in which people communicate, i... more This article describes how social media has revolutionised the way in which people communicate, interact and engage. This phenomenon has transformed the digital world with its ease, convenience and numerous capabilities for sharing, involving and participating in exchanges. The military is now being confronted with how this platform can be used to aid its activities. When utilised correctly, social media could become a force multiplier for the military. Day-to-day functions, official communications, networking and training are just some of the capabilities that can be supported by social media. However, clear guidance, management and governance are required in order to ensure that the platform is implemented correctly. This article discusses the drive for the use of social media within the military and how it can be utilised for military activities. It addresses the high-level functionalities of social media within the military, as well as an overall approach to guide the process.

2011 Information Security for South Africa, 2011
Social networking sites are a popular medium of interaction and communication. Social networking ... more Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users' knowledge. The popularity of social networks makes it an ideal tool through which awareness can be created on existing and emerging security threats. This paper proposes an interactive game hosted by social networking sites with the purpose of creating awareness on information security threats and vulnerabilities. The game applies principles of good game design which includes: the decisions over hypermedia, multimedia and hypertext to achieve perception, comprehension or projection, comprehensive database of questions, weighted system, use of practical data, automation, dynamcis, effort and user acceptance. The aim of the paper is show the effectiveness of using a virtual tool in cyber awareness creation. This paper will thus deal with the proposal of an interactive web-based game which informs and then tests users about potential security threats and vulnerabilities.

International Journal of Cyber Warfare and Terrorism, 2013
The use of social network sites has exploded with its multitude of functions which include postin... more The use of social network sites has exploded with its multitude of functions which include posting pictures, interests, activities and establishing contacts. However, users may be unaware of the lurking dangers of threats originating from Social Networking Sites (SNS) which include malware or fake profiles. This paper investigates the indicators to arouse suspicion that a social networking account is invalid with a specific focus on Facebook as an illustrative example. The results from a survey on users’ opinions on social networks, is presented in the paper. This helps reveal some of the trust indicators that leads users to ascertaining whether a social networking profile is valid or not. Finally, indicators of potentially deceptive agents and profiles are given as a guideline to help users decide whether they should proceed with interaction with certain contacts.

ICT Critical Infrastructures and Society, 2012
Social networking sites have increased in popularity and are utilized for many purposes which inc... more Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers.
This is a pre-print version of the published item. For access to the published version, please co... more This is a pre-print version of the published item. For access to the published version, please consult the publisher's website.
A large portion of the South African rural community only have intermittent access to computers a... more A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research conducted by the authors of this paper confirms that this lack of awareness, combined with the inherent dangers posed by the internet, expose local communities to cyber threats. Especially rural communities are not always empowered to deal with these threats.
Uploads
Papers by aubrey labuschagne